Patents
Literature
Eureka-AI is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Eureka AI

396results about How to "Protect interests" patented technology

Virtual gift task scalping prevention system and method in live-broadcasting platform

The present invention discloses a virtual gift task scalping prevention system and method in a live-broadcasting platform, and relates to the internet live-broadcasting technology field. The system comprises: a task rule setting unit configured to configure the task rule of a virtual gift; a user identification unit configured to identify and divide the user classification which includes normal users and black list users; and an execution unit configured to allow the normal users to obtain the virtual gift and prohibit the black list from obtaining the virtual gift. The concrete steps of the method comprises: S1, the task rule setting unit configures the task rule of obtaining the virtual gift by a user, and writing into a database to generate buffer memory; S2, the user identification unit is configured to identify and divide the user classification into the normal users and the black list users according to the task rule; and S3, the execution unit allows the normal users to execute and obtain the virtual gift and prohibit the black list from obtaining the virtual gift. The virtual gift task scalping prevention system and method in live-broadcasting platform reduce the data bulk artificial screening, effectively improve the efficiency, reduce the manpower cost and decrease the error rate.
Owner:WUHAN DOUYU NETWORK TECH CO LTD

Sharing system and sharing method for internet-of-things device

ActiveCN104219328AReflect the characteristics of open sharingSave resourcesTransmissionThe InternetDistributed computing
The invention relates to a sharing system and a sharing method for an internet-of-things device. The sharing system comprises a shared internet-of-things device, a service device, a sharing rule designing user, a shared user and a sharing control rule input device, wherein the service device comprises a sharing control rule verification module and a sharing control execution module, the sharing control execution module is connected with the sharing control rule verification module, the sharing control execution module sends a message to the shared user to inform the shared user, thereby, the shared user can know that a control rule of the shared internet-of-things device is already shared to the shared user, and when the shared user logs in the service device, the shared user can automatically obtain a corresponding permission to the shared internet-of-things device in accordance with the regulations in the sharing control rule. Compared with sharing systems and sharing methods in the prior art, the sharing system and the sharing method for the internet-of-things device have the advantages that the permission of the internet-of-things device can be shared to other users within the internet for usage, internet open sharing feature can be really reflected, and the idea of making the best use of everything and saving resources is reflected.
Owner:NINGBO HAIBO GRP CO LTD

Intelligent queuing method and system for hospitals

The invention discloses an intelligent queuing method and an intelligent queuing system for hospitals, and relates to the field of medical digit. The method makes new designs on determination of the time for appointed registration, and a queuing strategy for appointed registration patients, temporary registration patients and priority diagnosis patients, simultaneously adopts scientific queuing strategies such as the absolute priority of the appointed registration in the appointed time period, the diagnosis of the temporary registration patients/priority diagnosis patients in an idle time tr according to the sequence of a queue, the arrangement of the appointed registration patients outside the appointed time period as the temporary registration patients in the queue, and the like, and effectively and reasonably solves the diagnosis priority problem of the appointed registration patients, the temporary registration patients and the priority diagnosis patients; and the intelligent queuing system for the hospitals adopting the queuing method realizes the intellectualization and automation of the queuing, effectively solves the problem of adverse effect on the queuing caused by artificial subjective factors, and makes the queuing in the hospitals more scientific, reasonable and humanized.
Owner:ZHONGSHAN IKER DIGITAL TECH

Method for detecting illegal AP (Assembly Program) under centralized WLAN (Wireless Local Area Network) environment

InactiveCN102438238AStay safe onlineEffectively discover illegal APsSecurity arrangementAutomatic controlWireless control
The invention discloses a method for detecting an illegal AP (Assembly Program) under a centralized WLAN (Wireless Local Area Network) environment and relates to a wireless intrusion detection technique. An AP device and an illegal AP device are adopted in the method; an AC (Automatic Control) device is arranged; the AC device is a wireless controller used for managing the AP, establishing a WLAN and detecting the illegal AP; the AC device comprises a WLAN establishing module, a binary recording module, an illegal AP identifying module, a collecting module and a wireless scanning module which are interacted in turn; the binary recording module is interacted with the AP device; and the wireless scanning module is respectively interacted with the AP device and the illegal AP device. The method can be easily realized; a physical position of the illegal AP can be accurately positioned; the illegal AP in a space can be effectively found; same frequency interference or adjacent frequency interference between the illegal AP and legal AP is avoided; and the method is suitable for the WLAN under various complex networking environments, is free from being restricted by space and field as well as time and weather and can be implemented under any environment.
Owner:WUHAN HONGXU INFORMATION TECH

Computer booting anti-counterfeit authentication method based on BIOS

ActiveCN101777105ASolve the situation of replacing the old with the new and the false as the realProtect interestsUser identity/authority verificationInternal/peripheral component protectionComputer monitorCiphertext
The invention discloses a computer booting anti-counterfeit authentication method based on BIOS, which belongs to the technical field of computer application. The invention aims to provide a computer anti-counterfeit method which has high reliability, is easy to be operated, has low cost and simultaneously does not affect the customer experience; the method comprises the following steps: (a) a booting authentication unit is implanted in BIOS; (b) the booting authentication unit suspends a booting procedure after computer booting, the only ID of the computer is read, encrypted and displayed on a computer monitor; (c) a user sends the encrypted file to a remote anti-counterfeit authentication server through an information sending method; (d) the server decrypts the encrypted file and authenticates the only ID, and returns an activation code to the user after authenticates no error; and (e) the user inputs the activation code to the booting authentication unit, and the booting authentication unit continues the booting procedure after no error is authenticated. The computer booting anti-counterfeit authentication method based on BIOS can be used for computer anti-counterfeit.
Owner:宏电脑上海

Secure data exchange method and system for electric vehicle and charging and exchanging power station

The invention relates to a secure data exchange method for an electric vehicle and a charging and exchanging power station. The method comprises the following steps that: the electric vehicle transmits self digitally signed integrity information to the charging and exchanging power station, acquires the integrity information of the charging and exchanging power station and submits the integrity information of the charging and exchanging power station to a security information management centre; the charging and exchanging power station submits the integrity information transmitted by the electric vehicle to the security information management centre and submits the digitally signed integrity information to the electric vehicle; the security information management centre authenticates the integrity information and feeds an authentication result back; and when the authentication result is coincident, connection is established between the electric vehicle and the charging and exchanging power station, and the electric vehicle and the charging and exchanging power station exchange data. The invention also relates to the security information management centre and a secure data exchange system. The security of the electric vehicle and the charging and exchanging power station is verified through the equipment integrity information, so that the electric vehicle and the charging and exchanging power station, which are in normal state, are guaranteed to perform normal data exchange and charging and exchanging operation; and then the benefits of a user and a service provider are guaranteed.
Owner:STATE GRID CORP OF CHINA +2

Judgment method and device of malicious order address

The invention provides a judgment method and device of a malicious order address. By means of the judgment method and device of the malicious order address, a malicious order user can be quickly judged and found, particularly, the malicious order user who frequently scrambles for an order can be quickly judged and found and intercepted, the interests of a common user are ensured, the address query time is short, and the query efficiency is high. The judgment method of the malicious order address includes the steps that order addresses are received, and the addresses with the most identical parts as the order addresses are found from an address base and used as similar addresses according to a scheduled sequence; the similarity and query time difference of the similar addresses and the order addresses are calculated, and the accumulated query times of the similar addresses are acquired, wherein the query time difference is the minimum of the differences between the current query time of the order addresses and the query time of the similar addresses; based on the similarity, the query time difference and the accumulated query times, the scores of the order addresses are calculated; the order address of which the score is greater than a preset score threshold is judged as the malicious order address.
Owner:BEIJING JINGDONG SHANGKE INFORMATION TECH CO LTD +1

Internet online identification and reading file anti-theft and downloading system and method thereof

The invention discloses an internet online identification and reading file anti-theft and downloading system and a method thereof. The internet online identification and reading file anti-theft and downloading system mainly comprises a file uploading module, a format conversion module, a data separation module, an editing and distributing module, an encryption and authorization module, a reader module and a file downloading module, wherein the file uploading module is used for uploading file resources with various formats; the format conversion module is used for uniformly converting the file resources with the various formats uploaded by a file owner to display files with Flash formats; the data separation module is used for carrying out file cutting on the display files, extracting and saving a part of data into a database and realizing the data separation of the display files; the editing and distributing module is used for editing and distributing the uploaded files; the encryption and authorization module is used for carrying out encryption and authorization operation on downloaded files; the reader module is used for realizing the self protection of a reader and the online display and presentation of the file resources; and the file downloading module is used for being called by the reader module, downloading the files and the like. By adopting the internet online identification and reading file anti-theft and downloading system, the illegitimate replication and the illegitimate diffusion of protected files can be effectively controlled.
Owner:BEIJING GREEN FOREST INFORMATION TECH

Method for preventing embezzlement of bank card and system to realize the same method

The invention discloses a method preventing the bank card to be stolen and a system to realize the method. The method preventing the bank card to be stolen firstly picks the face pictures of the bank card user or authorized person; the second step, the picture information is sent to the face identifier; the third step, the face identifier processes the picture information; the fourth step, the pictures in face identifier is written in the bank card by the read-write equipment of bank card; the fifth step, when the holder uses the bank card and makes operation, the face picture information is read by the read-write equipment, and the face picture information is transmitted to the face identifier; the sixth step, picks the face pictures of the bank card user on the spot, and the face picture information is sent to the face identifier; the seventh step, the face identifier processes the picture information at the sixth step; the eighth step, compares the picture information of fifth step with the seventh step; finally, the compared result is input to the finance payment terminal and judges the operation is continued or not. The invention is fit for the method to protect the security of bank card.
Owner:SHANGHAI ISVISION INTELLIGENT RECOGNITION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products